U.S. patent application number 12/072868 was filed with the patent office on 2008-09-04 for imaging device configuration methods and imaging device management methods.
Invention is credited to Robert E. Haines, Mark A. Harper.
Application Number | 20080215454 12/072868 |
Document ID | / |
Family ID | 25524324 |
Filed Date | 2008-09-04 |
United States Patent
Application |
20080215454 |
Kind Code |
A1 |
Haines; Robert E. ; et
al. |
September 4, 2008 |
Imaging device configuration methods and imaging device management
methods
Abstract
A method includes determining, by a processor within a
peripheral device, that an amount of a consumable associated with
the peripheral device has decreased below a predetermined threshold
and transmitting an email from the peripheral device to order
additional supplies of the consumable.
Inventors: |
Haines; Robert E.; (Boise,
ID) ; Harper; Mark A.; (Middleton, ID) |
Correspondence
Address: |
HEWLETT PACKARD COMPANY
P O BOX 272400, 3404 E. HARMONY ROAD, INTELLECTUAL PROPERTY ADMINISTRATION
FORT COLLINS
CO
80527-2400
US
|
Family ID: |
25524324 |
Appl. No.: |
12/072868 |
Filed: |
February 28, 2008 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
09976642 |
Oct 11, 2001 |
|
|
|
12072868 |
|
|
|
|
Current U.S.
Class: |
705/26.2 ;
709/201 |
Current CPC
Class: |
G06Q 30/0641 20130101;
H04L 51/00 20130101; G06Q 30/0605 20130101; G06Q 30/0601 20130101;
G06Q 10/087 20130101 |
Class at
Publication: |
705/26 ;
709/201 |
International
Class: |
G06Q 30/00 20060101
G06Q030/00; G06Q 10/00 20060101 G06Q010/00 |
Claims
1-27. (canceled)
28. An imaging device configuration method comprising: receiving
information regarding a plurality of imaging devices of a plurality
of groups of a common network, wherein the receiving comprises
receiving using an external device which is external of the common
network; using the external device, communicating a message
regarding the imaging devices of one of the groups; using the
external device, receiving data regarding the imaging devices of
the one of the groups responsive to the communicating the message;
using the external device, generating configuration information
using the data, wherein the configuration information is usable to
configure the imaging devices of the one of the groups; and using
the external device, communicating a communication comprising the
configuration information.
29. The method of claim 28 further comprising identifying an
individual associated with the one of the groups, and wherein the
communicating comprises communicating the communication to the
individual and the receiving comprises receiving the data from the
individual.
30. The method of claim 29 further comprising configuring the
imaging devices of the one of the groups by the individual using
the configuration information.
31. The method of claim 30 wherein the imaging devices and the
common network are resources of an entity, the individual is
authorized to configure the imaging devices of the one of the
groups of the entity, and wherein the imaging devices of the one of
the groups are used by people of the entity who are different than
the individual.
32. The method of claim 28 wherein the receiving the data comprises
receiving the data regarding thresholds of use of the imaging
devices and the communicating the communication comprises
communicating the communication comprising the configuration
information which is usable to configure the imaging devices by
setting the thresholds for the imaging devices and which cause the
imaging devices to perform actions responsive to triggering of the
thresholds.
33. The method of claim 28 wherein the imaging devices consume a
consumable to form hard images upon media, and wherein the
receiving the data comprises receiving the data configured to set a
group order threshold which controls when a combined order is to be
placed for the consumable for the imaging devices of the one of the
groups.
34. The method of claim 28 wherein the imaging devices consume a
consumable to form hard images upon media, and wherein the
receiving the data comprises receiving the data comprising a
current amount of inventory of the consumable of a supplier who
supplies the consumable to the imaging devices of the one of the
groups.
35. The method of claim 28 wherein the imaging devices consume a
consumable to form hard images upon media, and further comprising:
indicating a need for replenishment of the consumable for at least
some of the imaging devices of the one of the groups; and
generating a combined order for the consumable for the at least
some of the imaging devices.
36. The method of claim 35 further comprising placing the combined
order to replenish the consumable for the at least some of the
imaging devices.
37. The method of claim 36 wherein the placing the combined order
comprises placing an order for another consumable not needing
replenishment at the time of the placing.
38. The method of claim 28 wherein the common network comprises a
firewall, and further comprising receiving a plurality of
executable instructions using an internal device inside of the
firewall from the external device, executing the executable
instructions using the internal device to discover the imaging
devices of the common network, and communicating identification
information regarding the imaging devices to the external device
after the discovering.
39. A imaging device management method comprising: receiving
executable instructions within a common network, wherein the
executable instructions are received from externally of the common
network and are passed by a firewall of the common network, wherein
a plurality of imaging devices are inside of the firewall and are
coupled with the common network; using an internal device inside of
the firewall and coupled with the common network, executing the
executable instructions to discover the imaging devices and to
generate identification information regarding the imaging devices;
and outputting the identification information regarding the imaging
devices externally of the common network including passing the
identification information through the firewall.
40. The method of claim 39 further comprising outputting a
communication externally of the common network, and wherein the
receiving comprises receiving the executable instructions
responsive to the outputting the communication.
41. The method of claim 39 further comprising defining a plurality
of different groups of the imaging devices, and wherein the imaging
devices are configured to use a consumable to form hard images upon
media, and further comprising, using the internal device,
communicating a group order threshold setting to the external
device and wherein the group order threshold setting identifies a
threshold when a combined order for the consumable is to be placed
for a plurality of the imaging devices of one of the groups.
42. The method of claim 39 wherein the imaging devices are
individually configured to use a consumable to form hard images
upon media, and further comprising, using the internal device,
outputting a plurality of threshold settings which identify
thresholds of the consumable for respective ones of the imaging
devices when the consumable is to be ordered for the imaging
devices.
43. An imaging device configuration method comprising: identifying
an individual associated with an organization which has a common
network and a plurality of imaging devices coupled with the common
network, wherein the imaging devices are used by people of the
organization other than the individual; using an external device
which is external of the common network, sending a message to the
individual; using the external device, receiving data from the
individual responsive to the sending; and after the receiving and
using the external device, outputting configuration information
usable to configure operations of the imaging devices with respect
to formation of hard images upon media by the imaging devices.
44. The method of claim 43 wherein the outputting comprises
communicating the configuration information directly to respective
ones of the imaging devices.
45. The method of claim 43 wherein the outputting comprises
communicating the configuration information to the individual.
46. The method of claim 43 wherein the imaging devices are
configured to use a consumable to form the hard images upon the
media, and wherein the outputting the configuration information
comprises outputting the configuration information which is usable
to set a threshold for replenishment of the consumable for at least
one of the imaging devices.
47. The method of claim 43 further comprising defining a plurality
of groups comprising different ones of the imaging devices, and
setting a group order threshold setting for replenishing the
consumable for the imaging devices of one of the groups in a single
order.
Description
CROSS REFERENCE TO RELATED APPLICATION
[0001] This is a Divisional application of Ser. No. 09/976,642
filed on Oct. 11, 2001, the disclosure of which is -incorporated by
reference.
COPYRIGHT NOTICE
[0002] Contained herein is material, including material
incorporated by reference, which is subject to copyright
protection. The copyright owner does not object to the electronic,
facsimile or electrophotographic reproduction of the patent
disclosure by any person as it appears in the Patent and Trademark
Office patent files or records, but otherwise reserves all rights
to the copyright whatsoever.
FIELD OF THE INVENTION
[0003] The invention relates to printers and other hard copy output
engines. More particularly, the invention relates to hard copy
output engine consumable supply management and related methods.
BACKGROUND OF THE INVENTION
[0004] As computer systems and data communications systems have
developed, the number and variety of hard copy output engines
employed in a typical office or factory setting has grown. Examples
include photo copiers, facsimile machines, printers and devices
including more than one of these capabilities. In turn, this has
led to a need to be able to order greater number of consumable
supplies, some of which are specific to specific types of hard copy
output engines.
[0005] As need for these types of hard copy output engines has
grown, a number of different manufacturers have developed different
hard copy output engines providing different operational
characteristics and capabilities. While some consumable commodities
associated with these devices are common to most or all such
devices (e.g., standardized paper sizes), other consumable
commodities, such as toners and toner supply cartridges or ink
reservoirs, tend to be unique to a specific manufacturer.
Additionally, different hard copy output engines may have different
paper capacities, capabilities for accepting more or fewer paper
sizes and different toner or other pigment supply requirements and
capacities.
[0006] It is generally helpful to have a mechanism for keeping
track of usage of consumable commodities in keeping computer
systems functional, and to determine when periodic or aperiodic
maintenance is desirable. For example, it is extremely helpful to
ensure that adequate supplies of replacement print media and
pigmentation or marker material are available when needed.
[0007] Coordination of orders for supplies can be very helpful to
avoid over- or under-stocking of these consumable commodities,
while still achieving the benefits of economies of scale by pooling
orders to service multiple hard copy output engines, especially
those using at least some of the same consumable commodities.
However, in many business settings, the sheer number of diverse
hard copy output engines being used in different aspects or
divisions of the business may lead to confusion in maintaining
adequate supplies of these consumable commodities.
[0008] What is needed is a way to facilitate provision of data
providing a communications link to suppliers of consumable
commodities, as well as data describing consumable commodity
status, for a network including one or more hard copy output
engines.
SUMMARY OF THE INVENTION
[0009] In accordance with an aspect of the present invention, a
method includes determining, by a processor within a peripheral
device, that an amount of a consumable associated with the
peripheral device has decreased below a predetermined threshold and
transmitting an email from the peripheral device to order
additional supplies of the consumable.
[0010] In accordance with another aspect of the present invention,
an article of manufacture includes a computer usable medium having
computer readable code embodied therein that is configured to cause
a processor contained in a peripheral device to (i) determine that
an amount of a consumable associated with the peripheral device has
decreased below a predetermined threshold and (ii) transmit an
email from the peripheral device to order additional supplies of
the consumable.
[0011] In accordance with yet another aspect of the present
invention, a computer implemented control system for a hard copy
output engine includes a memory configured to store a software
module and processing circuitry. The processing circuitry is
configured to employ the software module to determine that an
amount of a consumable associated with a peripheral device has
decreased below a predetermined threshold and transmit an email
from the peripheral device to order additional supplies of the
consumable.
[0012] Other features and advantages of the invention will become
apparent to those of ordinary skill in the art upon review of the
following detailed description, claims and drawings.
DESCRIPTION OF THE DRAWINGS
[0013] FIG. 1 is a simplified block diagram of a computer network
including a computer, a hard copy output engine and a firewall, in
accordance with an embodiment of the present invention.
[0014] FIG. 2 is a simplified flow chart of a process P1
illustrating how a system can interact with a vendor website across
the firewall of FIG. 1 to enable a peripheral device, such as the
hard copy output engine, to exchange information with a vendor
website via an embedded web server, in accordance with an
embodiment of the present invention.
[0015] FIG. 3 is a flow chart illustrating steps in carrying out a
process P2 for configuring devices discovered in the process P1 of
FIG. 2, in accordance with an embodiment of the present
invention.
[0016] FIG. 4 is a flow chart illustrating steps in carrying out a
process P3 for setting preferences for resellers and for
identifying purchasers for consumables and service for devices
discovered in the process P1 of FIG. 2, in accordance with an
embodiment of the present invention.
[0017] FIG. 5 is a simplified flow chart of a process P4 for
setting inventory parameters for the group or groups of peripheral
devices identified in the process P1 of FIG. 2, in accordance with
an embodiment of the present invention.
[0018] FIG. 6 is a simplified flowchart of a process P5 for
configuring a peripheral device, such as a hard copy output engine,
using information collected via the processes of FIGS. 2 through 5,
in accordance with an embodiment of the present invention.
[0019] FIG. 7 is a simplified flow chart of a process P6 in
accordance with an embodiment of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
[0020] FIG. 1 is a simplified block diagram of a computer network
10 including a computer 12 and a hard copy output engine 14, in
accordance with an embodiment of the present invention. The
computer 12 is coupled to the hard copy output engine 14 via a bus
16 allowing either the computer 12 or the hard copy output engine
14 to initiate data communications with the other. In one
embodiment, the hard copy output engine 14 is a device such as a
printer, copier, facsimile machine or a multifunction device
capable of providing two or more such functions. It will be
appreciated that while FIG. 1 illustrates only a single computer 12
and a single peripheral device 14 for ease of illustration and
convenience in understanding, multiple computers 12 and peripheral
devices 14 may all be coupled to the bus 16.
[0021] In one embodiment, the system 10 is coupled to an external
interconnection 17 via a data path 18. In one embodiment, the data
path 18 includes an intranet. In one embodiment, the data path 18
includes a local area network (LAN) or wide area network (WAN). In
one embodiment, the data path 18 includes access to the Internet
via a firewall 19.
[0022] Security is a constant challenge for networks and computing
engineers responsible for networks, and is discussed in
commonly-assigned U.S. Pat. No. 6,192,410 B1, entitled "Methods And
Structures For Robust, Reliable file Exchange Between Secured
Systems", issued to Miller et al. and which is hereby incorporated
herein by reference. In particular, and as discussed in the
afore-noted patent, it is important in wide area network
applications for computing systems attached to such a network to
secure their resources from inappropriate, unauthorized access. The
Internet is an example of a global wide area network where security
measures are often critical to an ongoing business enterprise
connected to the Internet Such security measures are required to
assure that unauthorized third parties, anywhere in the world,
cannot gain access to sensitive materials within the enterprise via
the global, publicly accessible, Internet.
[0023] Though such security measures or firewalls 19 are vital to
secure each particular enterprise, their very existence creates the
burden for those trying to legitimately exchange information
between enterprises via such global, public networks. A user in one
particular computing enterprise encounters a number of difficulties
exchanging data with another user in a different computing
enterprise via computer system to computer system network
communication links. Though the communication capability may exist,
for example via the Internet, safeguards and security measures
(firewalls 19) within each enterprise makes such
enterprise-to-enterprise exchanges difficult--exactly as they are
intended to do.
[0024] In general, such firewall 19 security measures operate at
lower layers of the network communication layered model to filter
out potentially harmful network data exchange. For example, the
firewall 19 may permit certain protocols to be exchanged only among
certain network devices known to be physically secured within the
enterprise. Network devices not within the permitted scope of
secured devices are not permitted to use the filtered protocols.
Should such un-authorized devices attempt such communications, the
firewall 19 simply discards their network data transfer requests.
As a result, a vendor may not be able to initiate data
communications between a database maintained by the vendor and
devices that have been deployed at clients of that vendor or allied
vendors.
[0025] In one embodiment, the computer 12 and the hard copy output
engine 14 are capable of exchanging data via a protocol compatible
with presence of other computers 12 or hard copy output engines 14
on the bus 16. In one embodiment, the computer 12 and the hard copy
output engine 14 employ an object-oriented request-reply protocol
supporting asynchronous printer query, control and monitor
capabilities, and that is capable of documenting the requests,
replies and data types supported by the protocol. In one
embodiment, a protocol known as PML is used.
[0026] The term "PML" refers to Printer Management Language, which
has been developed by the Hewlett-Packard Company of Palo Alto,
Calif. Further description of PML can be found at http//www.hp.com
or at http://www.hpdevelopersolutions.com, by entering a user name,
a user selected password, and by joining a solutions provider
program. More particularly, a PML Protocol Specification,
Hewlett-Packard Company. Nov. 18, 1998, Revision 2.3 is available
therein, and is hereby incorporated herein by reference.
[0027] One exemplary remote query language implemented within the
network system is a Simple Network Management Protocol (SNMP). In
such an exemplary configuration, host devices such as personal
computers 12 include respective processing circuitry (not shown)
operable to formulate an appropriate SNMP query or request which is
addressed to one or more appropriate computer peripheral devices
using a communication medium. The appropriate computer peripheral
device(s) receive the query or request and provide information back
to appropriate host devices or computers 12 using the communication
medium. Protocols other than SNMP are utilized in other embodiments
to implement communications within the system.
[0028] PML permits many applications to exchange device management
information with numerous computer peripheral devices, such as
image forming devices. Individual computer peripheral devices
implement any conversion operations between the protocol used to
exchange information with respect to computer peripheral devices
(e.g., SNMP) and the internal protocol (e.g., PML) used within the
respective computer peripheral devices.
[0029] In one embodiment, the data path 18 provides common gateway
interface (CGI) data communication capability. In one embodiment,
the data path 18 includes an email capability (e.g., simple mail
transfer protocol or SMTP) for facilitating data communication. In
one embodiment, the data path 18 includes a secure data path using
HTTP (hyper text transfer protocol) with SSL (secure sockets
layer), as is described in more detail in U.S. Pat. No. 5,657,390,
entitled "Secure Socket Layer Application Program Apparatus And
Method", issued to Elgamal et al. and U.S. Pat. No. 6,081,900,
entitled "Secure Intranet Access", issued to Subramanian et al.,
which patents are hereby incorporated herein by reference for their
teachings.
[0030] The hard copy output engine 14 includes a controller 20,
such as a conventional microprocessor or microcontroller. The hard
copy output engine 14 also includes one or more sensors 22 coupled
to the controller 20 and a memory 24 in data communication with the
controller 20. In one embodiment, the memory 24 comprises
conventional volatile and non-volatile memory units. In one
embodiment, the memory 24 includes magnetic, magneto-optic or
optical storage media, such as conventional disc storage or floppy
disc data storage units, or memory integrated circuits or CD-ROMs
or the like. In one embodiment, the hard copy output engine 14
accepts instructions as a computer instruction signal embodied in a
carrier wave carrying instructions executable by the controller
20.
[0031] The sensors 22 are coupled to consumable commodities
associated with the hard copy output engine 14. In one embodiment,
when the sensors 22 report that a quantity of a consumable
commodity (e.g., print media, paper, toner or ink) associated with
the hard copy output engine 14 has decreased to below a
predetermined threshold amount, or that malfunction of a dispenser
of a consumable commodity exists, the controller 20 initiates a
data communication ultimately intended for transmission via the
data path 18. Additionally, the sensors 22 may track data such as
number of sheets of media that have been printed, in order to
schedule maintenance operations.
[0032] The controller 20 and the memory 24 also comprise an
embedded web server 26. Embedded web server 26 refers to a web
server that is completely contained within a device, such as a
computer peripheral device. Embedded web servers 26 are configured
to provide management information about the peripheral device. An
embedded web server 26 can be used to manage or manipulate
individual peripheral devices, such as the hard copy output engine
14, that are present in the network 10. A web browser can be used
by a network user to access an embedded web server 26 in order to
obtain device status updates, perform troubleshooting operations,
change device configuration settings and to link to online customer
support.
[0033] The term "web server" refers to an application that runs on
a workstation or personal computer 12 within the network
environment 10, that lets users view HTML documents via the
Internet, to access hyperlinks and to transfer files. In operation,
web browsers request information from web servers and display the
information that the web servers send back. The information is
organized into pages containing text, graphics, sound and animation
formatted by HTML and Java.RTM. applets.
[0034] The term "web server" refers to a specialized program
running on a server that supports TCP/IP protocol. Web servers
enable workstations or personal computers 12 or other devices in
the network 10 to access external networks such as the Internet.
Web servers receive HTTP requests that browsers running on various
types of computer systems send. The web server could be asked to
get a text or graphics file, retrieve a ZIP file or run a program.
The web server then sends the information, files or program results
back to the requesting browser. Embedded web servers 26 are
contained within the hard copy output engine 14 itself to provide
management information about the hard copy output engine 14.
[0035] FIG. 2 is a simplified flow chart of a process P1
illustrating how a system can interact with a vendor website across
the firewall 19 of FIG. 1 to enable a peripheral device, such as
the hard copy output engine 14, to exchange information with the
vendor website via the embedded web server 26, in accordance with
an embodiment of the present invention.
[0036] Initially, it is desirable to provide the vendor site with a
list of system components, such as peripheral devices, associated
with that vendor. This process is called "device discovery". Device
discovery needs to take place at least once for each device that is
to be supported via the vendor website.
[0037] The process P1 is initiated when the MIS manager browses the
vendor website in a step S11.
[0038] In a step S12, the MIS manager downloads a device discovery
plug in via the web browser contained in the MIS manager's computer
12.
[0039] In a step S13, the device discovery plug in engages in
device discovery, that is, inventories peripheral devices that are
coupled to the bus 16 that are also associated with that vendor. In
one embodiment, the device discovery plug in includes information
entered by the MIS manager regarding peripheral devices that the
MIS manager knows have been added to the system or that have been
modified.
[0040] In one embodiment, the device discovery plug in acts as a
proxy for the vendor web site within the network 10 to poll and
identify peripheral devices and their addresses in the network 10
that are associated with that vendor. In one embodiment, peripheral
devices are identified via serial numbers. In one embodiment, the
device discovery plug in determines make and model number, as well
as options, for each peripheral device associated with that
vendor.
[0041] In a step S14, the discovered device information is stored
for reference. In one embodiment, the device information is stored
in memory associated with the vendor website.
[0042] In a step S15, the device Information is sorted into
suitable groups. For example, peripheral devices may be grouped
according to internal business structures associated with the
network 10, e.g., research and development, accounting etc. that
may also correspond to specific areas within a facility.
[0043] In a step S16, group names are stored for reference. In one
embodiment, the group names and data relevant to the individual
devices are stored in a memory associated with the vendor web
site.
[0044] In a step S17, a purchase authorizer is identified for each
of the groups determined in the step Si 5. The purchase authorizer
is responsible for authorizing purchases of consumables associated
with the peripheral devices and for authorizing periodic and
aperiodic maintenance. Additionally, the vendor may provide
information to the purchase authorizer regarding product upgrades
or accessories as these become available.
[0045] In a step S18, maintainers are identified for the groups
identified in the step S15. In one embodiment, email addresses for
maintainers are collated with the groups identified in the step
S16. In one embodiment, the email addresses are stored with the
groups in a memory associated with the vendor web site.
[0046] The process P1 then ends. The process P1 provides a way for
a vendor website to obtain information from a private network 10
across the firewall 19 without compromise of the security of the
private network 10. The process P1 also does not require any added
hardware for the network 10.
[0047] FIG. 3 is a flow chart illustrating steps in carrying out a
process P2 for configuring the devices that were discovered in the
process P1 of FIG. 2, in accordance with an embodiment of the
present invention. The process P2 begins in a step S21.
[0048] Optionally, the process P2 may be initiated by the vendor
web site sending an email to the maintainer in the step S21 using
the email address obtained in the step S18 of the process P1 of
FIG. 2. The email may include information specific to the group of
devices identified as being associated with that maintainer in the
step S18 of the process P1.
[0049] Alternatively, the process P2 may be initiated by the
maintainer of the peripheral devices. In either case, the
maintainer launches a web browser to interact with the vendor web
site in a step S22. In one embodiment, the maintainer launches the
web browser using a URL contained in the email message received by
the maintainer in the step S21. In one embodiment, the URL is
specific to the list of peripheral devices associated with the
maintainer.
[0050] In a step S23, the maintainer browses the vendor web site to
configure a portion of the vendor web site. In one embodiment, the
maintainer sets maintenance notification thresholds. For example,
some types of maintenance may be set to take place after a
predetermined number of sheets of media have been printed, or
following a predetermined number of hours of operation, or may be
based on other operation-dependent or seasonal criteria.
[0051] In a step S24, the maintainer sets thresholds for
replenishment of consumables. In one embodiment, these are set via
interaction with the vendor web site.
[0052] In a step S25, the vendor web site collates the thresholds
set by the maintainer and sends back an electronic message
including configuration data to be used by the embedded web server
26 in the peripheral device. In one embodiment, an email including
a hotlink having an attached CGI script or an XML list is sent from
the vendor web site to the maintainer. A hotlink is an Internet
address, usually in the form of a URL (universal resource locator)
that can be readily activated, for example by selecting it with a
mouse or other tactile input device, to access the web site at that
Internet address.
[0053] In a step S26, the maintainer then uses this electronic
communication to set the thresholds in the peripheral device via
the embedded web server 26.
[0054] In one embodiment, the vendor web site provides a hot link
at the vendor web site that, when activated by the maintainer,
performs substantially the equivalent of the steps S25 and S26.
[0055] In one embodiment, the vendor web site may send an email
directly to the embedded web server with the configuration data in
the step S25. The embedded web server 26 then uses this electronic
communication to set the thresholds in the peripheral device via
the embedded web server in the step S26. In one embodiment, the
email may be sent to a system administrator to be forwarded to the
peripheral device. This allows additional screening to address
potential security concerns.
[0056] In one embodiment, a device configuration plug in becomes
part of the browser. The plug in takes the configuration data from
the vendor web site and configures the peripheral. In one
embodiment, SNMP is used to configure PML objects to configure the
peripheral.
[0057] For example, the maintainer may need to be aware of an
upcoming shortfall of media or pigmentation or marking material and
thus may want to have the re-ordering process start when the supply
falls to a predetermined level. Alternatively, the maintainer may
prefer to have the re-ordering process initiate when the consumable
is essentially depleted. Additionally, the maintainer may want to
pool consumable orders over a group of peripherals or over time.
The maintainer may also want to coordinate maintenance of local
stocks of consumables with changes in consumption, and may opt to
replace some consumables that would not otherwise be replaced when
other consumables require replacement (e.g., replace a low toner
cartridge of one color when another toner cartridge is exhausted)
in order to optimize labor content.
[0058] The process P2 then ends.
[0059] FIG. 4 is a flow chart illustrating steps in carrying out a
process P3 for setting preferences for resellers and for
identifying purchasers for consumables and service for the devices
that were discovered in the process P1 of FIG. 2, in accordance
with an embodiment of the present invention. The process P3 begins
in a step S31.
[0060] Optionally, the process P3 may be initiated by the vendor
web site sending an email to the purchase authorizer in the step
S31 using the email address obtained in the step S17 of the process
P1. The email may include information specific to the group of
devices identified as being associated with that purchase
authorizer and maintainer in the step S18 of the process P1.
[0061] Alternatively, the process P3 may be initiated by the
purchase authorizer for consumables for the peripheral devices. In
either case, the purchase authorizer launches a web browser to
interact with the vendor web site in a step S32. In one embodiment,
the purchase authorizer launches the web browser using a URL
contained in the email message received by the maintainer in the
step S31. In one embodiment, the URL is specific to the list of
peripheral devices associated with the purchase authorizer.
[0062] In a step S33, the purchase authorizer identifies purchasers
associated with the group of peripheral devices identified in the
process P1. In one embodiment, the purchase authorizer provides
email addresses for the purchasers, and these may be stored in a
memory associated with the vendor web site.
[0063] In a step S34, the purchase authorizer identifies preferred
resellers of consumables for the peripheral devices, and these may
be stored in a memory associated with the vendor web site.
[0064] The process P3 then ends.
[0065] FIG. 5 is a simplified flow chart of a process P4 for
setting inventory parameters for the group or groups of peripheral
devices identified in the steps S15 and S16 of the process P1 of
FIG. 2, in accordance with an embodiment of the present invention.
The process P4 begins in a step S41.
[0066] Optionally, the process P4 may be initiated by the vendor
web site sending an email to the purchaser in the step S41 using
the email address obtained in the step S17 of the process P1. The
email may include information specific to the group of devices
identified as being associated with that maintainer in the step S33
of the process P3.
[0067] Alternatively, the process P4 may be initiated by the
purchaser for consumables for the peripheral devices. In either
case, the purchaser launches a web browser to interact with the
vendor web site in a step S42. In one embodiment, the purchaser
launches the web browser using a URL contained in the email message
received by the purchaser in the step S41. In one embodiment, the
URL is specific to the list of peripheral devices associated with
the purchaser.
[0068] In a step S43, the purchaser may set group order threshold
settings, and these may be stored in a memory associated with the
vendor web site. This may be used to combine orders to service
needs for a group of peripheral devices using a local store of
consumables as a buffer.
[0069] In a step S44, the purchaser may set current inventory
levels for the local store of consumables, and these may be stored
in a memory associated with the vendor web site.
[0070] In a step S45, the purchaser sets minimum inventory order
trigger thresholds, and these may be stored in a memory associated
with the vendor web site.
[0071] In a step S46, the purchaser sets maximum target Inventory
levels, and these may be stored in a memory associated with the
vendor web site.
[0072] In a step S47, the purchaser sets order notification
settings, and these may be stored in a memory associated with the
vendor web site.
[0073] The process P4 then ends.
[0074] FIG. 6 is a simplified flowchart of a process P5 for
configuring a peripheral device, such as a hard copy output engine,
using the information collected via the processes P1 through P4 of
FIGS. 2 through 5, in accordance with an embodiment of the present
invention.
[0075] In one embodiment, the data collected by the processes P1
through P4 are used to derive XML configuration data in a step
S51.
[0076] These data are then emailed from the vendor web site to the
network 10 in a step S52. In one embodiment, the data are emailed
directly to the embedded web server 26 of the hard copy output
engine 14 or other peripheral device in the step S52.
[0077] In one embodiment, the data are emailed to a responsible
party for review in the step S52. In this embodiment, the data are
forwarded, for example via email, to the embedded web server 26
after review by the responsible party in an optional step S53.
[0078] In a step S54, the XML configuration data interact with the
embedded web server 26 to set thresholds in the peripheral device,
such as the hard copy output engine 14.
[0079] In one embodiment, the data collected by the processes P1
through P4 are used to derive XML configuration data that are then
emailed to the network 10 in the step S52. In one embodiment, a CGI
script is used to convey the configuration data.
[0080] The process P5 then ends.
[0081] While the flowcharts of FIGS. 2 through 6 assume that
separate individuals fill the roles of MIS manager, maintainer,
purchase authorizer and purchaser, it will be appreciated that some
or all of these roles may be played by one or more persons, or by
more or fewer persons. It will also be appreciated that many of the
acts of FIGS. 2 through 6 need not occur in the order in which they
are described and may take place contemporaneously.
[0082] Benefits include allowing the user to configure the hard
copy output engine for ease of ordering and maintaining supplies of
consumables. This is accomplished without requiring the user to add
software modules or hardware to the network 10. Additionally, the
firewall 19 maintains integrity of the system 10.
[0083] The process P6 is initiated at a step S61 wherein status of
a consumable and/or predetermined work of a peripheral device are
detected.
[0084] At a step S62, the status detected in step S61 is collated
with an identifier of the peripheral device to which the status
pertains.
[0085] At a step S63, an electronic message is sent to an
appropriate recipient, such as a maintainer and/or authorized
purchaser, regarding the status and the respective identifier.
[0086] At a step S64, the maintainer operates to collate messages
regarding status and identifiers of multiple peripheral devices
associated with the recipient.
[0087] At a step S65, the recipient sends an electronic message to
the vendor website regarding the status and identifiers of the
respective peripheral devices.
[0088] At a step S66, it is determined whether data from the status
exceeds appropriate thresholds of the respective peripheral
devices.
[0089] If the condition of step S66 is negative, the process PB may
revert back to step S61.
[0090] If the condition of step S66 is affirmative, the process P6
may proceed to a step S67 wherein consumables are shipped and/or
maintenance is scheduled depending upon the status of the
peripheral devices.
[0091] At a step S68, the status may be reset for subsequent
monitoring and comparison.
[0092] The protection sought is not to be limited to the disclosed
embodiments, which are given by way of example only, but instead is
to be limited only by the scope of the appended claims.
* * * * *
References